There are 11 social and ehtical issues we should cover for all of the topics covered in the ITGS syllabus. As we can't see them without any knowledge we will be covering through the first 6 months of the course. After that students will be revisiting this area to complete them. Here is the list of the 11 social and ethical issues, try to write examples for each of them.
Security:
Security refers to the protection of hardware, software, machines and netowrks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society's confidence in the information contained in the systems.
Security Examples:
Authenticity
Authenticity means establishing the user's identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentiation is a user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.
Authentication Examples:
1.- When you enter someone's e-mail adress with/out that persons permission and you sent a threat to somebody, the one that will be blamed of the threat would not be you, instead they will balem the actual owner of the e-mail adress. This until the owner claims and proves he/she did not send the threat, mainly by proving she wasn't connected or using the Internet at the hour it was sent.
Security:
Security refers to the protection of hardware, software, machines and netowrks from unauthorized access, alteration or destruction. Security measures include restricted access to machines and networks and encryption of information. The degree of security of information systems determines society's confidence in the information contained in the systems.
Security Examples:
Authenticity
Authenticity means establishing the user's identity beyond reasonable doubt. Authenticating the user is crucial in many situations, particularly in business and legal matters. A simple example of authentiation is a user login onto a network. A more advanced example would be the use of encrypted digital signatures in a business transaction.
Authentication Examples:
1.- When you enter someone's e-mail adress with/out that persons permission and you sent a threat to somebody, the one that will be blamed of the threat would not be you, instead they will balem the actual owner of the e-mail adress. This until the owner claims and proves he/she did not send the threat, mainly by proving she wasn't connected or using the Internet at the hour it was sent.Reliability
Authenticity mean
Reliability Examples:
1.- When you enter
Privacy
Authenticity mean
Privacy Examples:
1.- When you enter sPrivacy
Authenticity meanPrivacy Examples:
1.- When you enter sAnonymity
Authenticity meanAnonymity Examples:
1.- When you enter s